Jump to content

Runbooks: Difference between revisions

From Archive
Creating Runbooks documentation from contingency planning notes
 
Updated main runbooks page to link to individual detailed procedures
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
'''Runbooks''' are systematic procedure guides designed for handling specific crisis scenarios and emergency situations. The concept emphasizes actionable protocols over information storage, providing step-by-step procedures that can be executed under stress.
'''Runbooks''' are field-tested emergency procedures designed for independent journalists, field workers, and anyone operating alone in remote locations. Each runbook provides step-by-step protocols that can be executed under stress.


== Philosophy ==
== Core Emergency Runbooks ==


Runbooks operate on the principle of separating sensitive information storage from procedural guidance. This approach ensures that procedures remain accessible and executable even when primary systems are compromised, while keeping sensitive data secured separately.
=== [[Vehicle Failure Runbook]] ===
Complete procedures for handling transportation breakdowns during field operations, including safety assessment, damage evaluation, insurance procedures, alternative transportation, and work continuity planning.


The system is designed to be simple enough to use during a crisis but comprehensive enough to handle complex situations.
=== [[Digital Security Incident Runbook]] ===
Comprehensive response protocols for account compromises, device theft, and system access loss, covering immediate isolation, account recovery, source protection, and system restoration.


== System Architecture ==
=== [[Solo Medical Emergency Runbook]] ===
Emergency medical procedures for serious illness or injury when working alone, including self-assessment, emergency response, evacuation procedures, and work continuity measures.


=== Dual-Component Design ===
=== Equipment Theft/Loss Runbook ===
''(Planned - procedures for securing systems after equipment theft, insurance claims, replacement workflows, and maintaining operational security)''


The runbook system consists of two complementary parts:
=== Legal/Detention Runbook ===
''(Planned - protocols for arrest situations, legal representation, communication restrictions, and professional obligations during detention)''


# '''Information Repository''': Secure storage of critical data (credentials, contact information, serial numbers)
== System Architecture ==
# '''Procedure Guides''': Step-by-step protocols for specific scenarios


=== Storage and Access ===
=== Information Separation ===
Runbooks contain only procedural guidance. Sensitive information (account numbers, contact details, medical information) is stored separately in encrypted password managers and secure document storage.


Runbooks are maintained in multiple formats and locations:
=== Access Methods ===
* '''Digital copies''': Encrypted local storage and cloud backup
* '''Physical copies''': Laminated field guides stored in equipment kits
* '''Memory aids''': Key decision trees memorized for situations where written procedures aren't accessible


* Encrypted local storage
== Implementation Guidelines ==
* Printed copies for field operations
* Cloud backup (encrypted)
* Physical copies at secure locations
 
== Core Runbook Categories ==
 
=== Field Operations ===
* '''Equipment failure protocols''': Procedures for handling technical breakdowns in remote locations
* '''Transportation contingencies''': Alternative transport activation and incident management
* '''Communication fallbacks''': Maintaining connectivity when primary systems fail
 
=== Digital Security ===
* '''Access restoration procedures''': Recovery from account lockouts and security breaches
* '''Remote system management''': Controlling and securing systems from alternative locations
* '''Data protection protocols''': Securing sensitive information during compromises
 
=== Medical and Personal Safety ===
* '''Solo emergency procedures''': Self-assessment and evacuation protocols
* '''Emergency contact cascades''': Systematic notification procedures
* '''Location broadcasting methods''': Ensuring help can locate you in crisis


=== Asset Protection ===
=== Preparation Phase ===
* '''Theft response procedures''': Immediate security measures and recovery steps
# Study runbook procedures in non-emergency conditions
* '''Insurance claim protocols''': Documentation and filing procedures
# Practice key decision trees and communication protocols
* '''Replacement workflows''': Minimum viable kit deployment
# Verify all emergency contact information and backup systems
# Test equipment and communication methods specified in procedures


== Implementation Guidelines ==
=== Activation Phase ===
# Quickly assess situation to identify applicable runbook
# Follow step-by-step procedures without deviation during crisis
# Document actions taken for post-incident analysis
# Communicate status updates per runbook communication protocols


=== System Maintenance ===
=== Recovery Phase ===
# Complete all follow-up actions specified in applicable runbook
# Document lessons learned and system performance during incident
# Update procedures based on real-world effectiveness
# Brief trusted contacts on incident resolution and system improvements


'''Quarterly Tasks:'''
== System Maintenance ==
* Verify all stored information remains current
* Test emergency access procedures
* Update contact information
* Check physical copy integrity


'''Annual Tasks:'''
=== Regular Testing ===
* Complete system review and testing
* '''Monthly''': Review contact information and verify system access
* Refresh all physical copies
* '''Quarterly''': Full walkthrough of one randomly selected runbook
* Update insurance and policy information
* '''Semi-annually''': Test all backup communication and access methods
* Review and revise procedures based on experience
* '''Annually''': Complete system review and update all procedures


=== Usage Protocol ===
=== Documentation Updates ===
* Update procedures after any real-world activation
* Incorporate lessons learned from training exercises
* Revise based on changes to insurance, equipment, or operating procedures
* Version control all changes with dates and rationale


# '''Situation Assessment''': Identify which runbook applies to current crisis
== Usage Philosophy ==
# '''Information Access''': Retrieve necessary data from secure storage
# '''Procedure Execution''': Follow step-by-step protocols
# '''Documentation''': Record actions taken during incident
# '''System Update''': Incorporate lessons learned post-incident


== Security Considerations ==
These runbooks assume:
* '''Limited cognitive capacity''' during crisis - procedures must be simple and clear
* '''Degraded communication''' - multiple backup methods and clear priorities
* '''Equipment failure''' - procedures work with minimal tools and technology
* '''Time pressure''' - critical actions prioritized in first 15 minutes of each scenario


* Runbooks contain no sensitive data, only procedures
The goal is not perfection but rapid, effective response that protects life, maintains operational security, and preserves professional obligations even under adverse conditions.
* All digital copies are encrypted
* Physical access is controlled and monitored
* Regular security reviews of access methods
* Redundant recovery methods prevent single points of failure


== Categories ==
== Categories ==


[[Category:Operations]]
[[Category:Emergency Procedures]]
[[Category:Emergency Procedures]]
[[Category:Documentation]]
[[Category:Field Operations]]
[[Category:Risk Management]]
[[Category:Solo Operations]]

Latest revision as of 22:08, 31 August 2025

Runbooks are field-tested emergency procedures designed for independent journalists, field workers, and anyone operating alone in remote locations. Each runbook provides step-by-step protocols that can be executed under stress.

Core Emergency Runbooks

Vehicle Failure Runbook

Complete procedures for handling transportation breakdowns during field operations, including safety assessment, damage evaluation, insurance procedures, alternative transportation, and work continuity planning.

Digital Security Incident Runbook

Comprehensive response protocols for account compromises, device theft, and system access loss, covering immediate isolation, account recovery, source protection, and system restoration.

Solo Medical Emergency Runbook

Emergency medical procedures for serious illness or injury when working alone, including self-assessment, emergency response, evacuation procedures, and work continuity measures.

Equipment Theft/Loss Runbook

(Planned - procedures for securing systems after equipment theft, insurance claims, replacement workflows, and maintaining operational security)

Legal/Detention Runbook

(Planned - protocols for arrest situations, legal representation, communication restrictions, and professional obligations during detention)

System Architecture

Information Separation

Runbooks contain only procedural guidance. Sensitive information (account numbers, contact details, medical information) is stored separately in encrypted password managers and secure document storage.

Access Methods

  • Digital copies: Encrypted local storage and cloud backup
  • Physical copies: Laminated field guides stored in equipment kits
  • Memory aids: Key decision trees memorized for situations where written procedures aren't accessible

Implementation Guidelines

Preparation Phase

  1. Study runbook procedures in non-emergency conditions
  2. Practice key decision trees and communication protocols
  3. Verify all emergency contact information and backup systems
  4. Test equipment and communication methods specified in procedures

Activation Phase

  1. Quickly assess situation to identify applicable runbook
  2. Follow step-by-step procedures without deviation during crisis
  3. Document actions taken for post-incident analysis
  4. Communicate status updates per runbook communication protocols

Recovery Phase

  1. Complete all follow-up actions specified in applicable runbook
  2. Document lessons learned and system performance during incident
  3. Update procedures based on real-world effectiveness
  4. Brief trusted contacts on incident resolution and system improvements

System Maintenance

Regular Testing

  • Monthly: Review contact information and verify system access
  • Quarterly: Full walkthrough of one randomly selected runbook
  • Semi-annually: Test all backup communication and access methods
  • Annually: Complete system review and update all procedures

Documentation Updates

  • Update procedures after any real-world activation
  • Incorporate lessons learned from training exercises
  • Revise based on changes to insurance, equipment, or operating procedures
  • Version control all changes with dates and rationale

Usage Philosophy

These runbooks assume:

  • Limited cognitive capacity during crisis - procedures must be simple and clear
  • Degraded communication - multiple backup methods and clear priorities
  • Equipment failure - procedures work with minimal tools and technology
  • Time pressure - critical actions prioritized in first 15 minutes of each scenario

The goal is not perfection but rapid, effective response that protects life, maintains operational security, and preserves professional obligations even under adverse conditions.

Categories